Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
eaae12fa632dd68541ed2fa26457f862_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaae12fa632dd68541ed2fa26457f862_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eaae12fa632dd68541ed2fa26457f862_JaffaCakes118.html
-
Size
194KB
-
MD5
eaae12fa632dd68541ed2fa26457f862
-
SHA1
495207331d83319e5c383e2261b4f3d760d042f7
-
SHA256
e47870833476fd90a05fc3389062ac464c1f8e497d4ee1b9a15116c63fb7ccb1
-
SHA512
c714d6db76e8e3921bf23fb6d9ac643de15c5ce360c27e6f91c81b958a3cc3a5284c775767100f0a629d32a115da225dfc76778d3b050fcbc49b1a83600ae2dd
-
SSDEEP
3072:sLNtyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:sLN4sMYod+X3oI+YS1tA8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60a04299550adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432885906" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C4C023C1-7648-11EF-A087-5EE01BAFE073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000fb8112f886b0132bd6d98759a23cb6fb23ca9102abcb55cb07167ed032d87d52000000000e8000000002000020000000ec2e8fab2fd52e957d0c5879bf1a84bdccb3fd775a06b8814e05d024d1330aae20000000a6aad8dba55eb479b847838e2dbe5e42d40d87c0ecd7e7700ca368fb8e47602d4000000095c1ce9831ab26c2d1f8130035ef9cbccdab24a2729d51d7972e78f16c19699f1b26cc755a40a19cf38a7230a6c49eb5089442b37f620399a29068f8ee45ae60 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 3068 2532 iexplore.exe 30 PID 2532 wrote to memory of 3068 2532 iexplore.exe 30 PID 2532 wrote to memory of 3068 2532 iexplore.exe 30 PID 2532 wrote to memory of 3068 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eaae12fa632dd68541ed2fa26457f862_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b47525c0feecf29808ec87f781d75c4d
SHA1fbaf63b31fab799daccc8d2ce65020d5a3d19058
SHA256b9de6406fdad104a3b6db3c6c97854c7dc141bf95d605dced8314060b899b5da
SHA5123f02ca838d25feeaf0fbda7c3889b68b84221a2263d0973b35c2ee70056d3e03ab06112c4756f3355a42abfaf75d7e56b2a55fa1d6c9134af526504f3e950a89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b776e05a87ad18ca13ac6b85ca5c4ef
SHA1fdb292b60672b83e8f5c9bb8cacf5781edd5d51a
SHA256b86920d79183e4a9abc5bf24231d4700f4380287a7a2a67680d12e15b21d1558
SHA51231415f2756150ea98f91ae09ef308c5540fa22bacf2991fc8959b61aa4346dde26100c25abbd4d67d92e81ee2de2f89cc77716ce4b902b46449a965d70e1b224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ebd5ba8f10b967aeb61f918e1b454c5
SHA14af5afe428d9346fad79686fb0c0b7fe93e62044
SHA256b3d9428742aa5816c6d7a6630b02c138050d29a2388c0861cdb4031df17bcf99
SHA5121176e9065083b405090b07f9aaaf24b44551e05dc505668194d9dc8a62299843643f55dc74b9dd262d6aac3114b3183916de733cc0d1915fecd76a2590f1ed62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0d30d8a5f9b529916a873d08fc6ff2
SHA1004430d90dd9bc369c167ea44972c2b2e35238ae
SHA25634fd22a9d2b8259c849a77e9b0f294df1427899f748f0f6539d9f42f7c2d5c10
SHA5126acb90daa7545341ce3004da415b686137eeb4e92aa50041b55110e29477a3428af01e4b5aee6d1df5902fe8ed16fc200022692f862d09b7273b6e69c18e2247
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb993a3a7038441b83efd332997213cd
SHA1649ad6b993c2ea0ec1bbaae24b5fb05e549eae93
SHA25653dc9f75b2b07195ab4ea047a075b39df0d027689b7ee04a55d55bd250536d97
SHA512d109de907551c5d58f1ae4fcb46a4906e2a006e7a66d1f4d6df437442be4bed44e20550bde693d2d8cdb8c0d59b6d2f396df27778ebdbb43964925449d5fb588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5234dc65087a3d6fad57968692fe1db13
SHA10e5c702bddfb8aa34c51765b72b0533ee0438696
SHA256733dab46f3607dfdb1e47627b885fb8cf2d148d7120c7b72c64a379727951c27
SHA512c52f506a51994408cb6405ea643bfec7c5c146f5460a9aa7aa799c1ff702b54cc5de21e40bd8cd4a68e35baca9e803c5fd584ab35c076c44c4b35e0b974139ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebb7824572e5e51dead103b9483d67a6
SHA1bd6c69c8ec2aa3fa10f69685b9bbe6ce68898200
SHA256a5c9644a71a8d6cf0867b88f87f4d5575e7c80523051c4f5ec1d8d01c260566e
SHA51260b7c238ed26b0f5f172c4ee30df3b52c83f7c93eac1d703833bb5c25f046f5edfdd15906e3be7055d610be421bd85e534d52c1164a8865533528646a8050fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eff1141fa93b3b66593fff479017abf5
SHA1aebdcc515931da2ea6c3377ad9c623ad8f9c99d5
SHA25608daa4a6d1dba256a0f80fbfbc0f96e92161ffaea6cbe87490b1a0bb18e1655d
SHA512865f2938e47379a2b8c43c8b165435917e992495531155ab589378103879ff174c8d2805d76864db430e0a162667b4fb9c2d8207b516a927ac1d4176b1e39bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530c922e1e928f42b58ae3ef5cb73e4d5
SHA1d19e02a7c0b75e857d25d5d88cd55873d9f5380b
SHA25638574c2d4e317c8d5740adf085b3a18c7ac63030f98af186bbbf30025800882d
SHA51269210ae141a70e3c032e839fb48a44d71afe7b1a47f877303d6409012aafaa0b1f527050b30a9c805a4ce3eafee44589fd2354b80c2366b56cfce9ea807466de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad8f9976996de4e4839c0ecd75c15092
SHA10a325efa3d556514f3c6385af7c15901ccd0df85
SHA2568eb065fa3a8c4e5986019f12626c178d9324358c6340e5d35e51f9cf5b9d4062
SHA512bb13e3ca782dcdcbdbd495dc322fe21dfe395cd5a9b9f3eaf1632e1ad23961289576fb154fbd1411d93cb8497a7c3dc98bf6acc0d86b9091e91d00eb9bed9348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7870dae1dfa6c78d881ddb542291206
SHA103c7921f662a1850f87b87d055bac99a51c0bb35
SHA2565fa43c09cb344b96dcacac0a6943f4322cfca7a9f75bb66772d1fa83912eeb0c
SHA512a4edfd11199c732be19c6d4336515bc7246de0ccc81e089538b221807007a6eb2eee7c9390e8397b5a8c07353d259f97b0bc97097988769b73518b6e372b60f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5789bf58978a01eab083de64c074edd06
SHA1e1f3722293d6a2b80a6485b2fe580b19d4c75326
SHA2567a36957822e0a9ffb8ae031ccb67b3b1f3da71133edcbc7d0a27a00c9825d24f
SHA512eb92a949285d652181cf79bcef2ebd2bedfafb392fb03fbe416f4667b38f71978f984d090c44b8bc580d972b442e590c6c8906d020a396faed9e5408fd94cd1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45424b568f8658e40ad7a37339d0a92
SHA1ee91625c85201518adc791470bcac9e7cec17aa9
SHA2569d601670c758b82c820bde4b7cedafd768372f929f555757b20fc8919396ada4
SHA51263332874b9053c8390743002301e7243920fc8ed6bd6c65fd914f8a818570b44ce8f06c71f22d550456f91525a9202c033151e389d6c21138d91b48ed75b7ea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85a653ad13875caa61f6bf405546c3e
SHA1d8c0e1aebbc0e290312b7abdde5b5e26bd744042
SHA2563627397678de9df8224c9ded6ef05a3c90f50e77eca426c8f0326084512fb9ea
SHA5122cbe177c425338868996f54a346a87ed138586880f4f4ba9e18dbc2a2a36b73564c8ffa00a4450648a471d4e55efd93495879d1657846a664d22f7252c3b47f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a16d4682bad0a500609f43c6dc1ec19
SHA1839826af3b20340ce80d42f6efcbdeead370a53f
SHA2566644f697db4437410f56ea886b69591e2e6e3fa55d518dc51e95af40232acb43
SHA512b5cde47fa9115147690f9652a2c8391fc4680f5b6ab9365cd6944f090826152bcabae670b83b209f26c6af084658ac9be0ec7e9efb3b66b604799af07bb9ee93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f15f8882dd4901972f1723d614012b0
SHA13add42a7bade09234e827b144187c816aa137fea
SHA25608249c987807d36f0b70da700677201aca2cf13dc52d5724f91fb3d18c7d648b
SHA5124246e35169ad64dabaeca8fc4b65a488fc171ab7161b8032773011ee1b4b2b055ca7abc03160ea119cdb039b31a105d152415c217b3bb2e9e7df64eeb08723bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ad3b7eac4a2693c4db8fd4981877b4
SHA1a0a5c1c62e04e3352dc6de868b6dec60ff8d2855
SHA256c40be55326d0737cc9a95e20132c4b2e8acd3a1bd79d6cedaacd7f923babdfb0
SHA512cc38c1cc9fdc26dbd439926c06e0ad750d85d2f504b9a1de58e0ebbf14684f2705a818f08b25e08b02da0f8d6e7e852a339b29c486e17612d8c1e919c6669129
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58586542673dbcc8d104cf1a06d014bd9
SHA1012b6abf03435061077fdbc7e6b9dd68eabb0baf
SHA256f0a4852b764e98ab0b7091c65cdf7d992a6ec08c4e511224df1c07b6ebfa220c
SHA512d7a699cf88552eea77f95210e521976c3d7f649806ff23a35080eaad45e821159265be777f64470fec8e140f818018f9eb823cefe3732ecd442fea0044c7235c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a8023232bc4acf07bc93d4f653ef40
SHA1b08d0fe49119204428923203ec5ce034bd766dd0
SHA256bc2089a2f8b4cbdfc8fcd3f741018782e28c2e44104eeb374516cb5dd1080074
SHA5126402e5371c958a2e0ae2fba7482af5ae34ad1b342157f494d7e157d21a88ef52c4ba03fa86bebab8da0952a943542aa7d5c7b2f1812dfecca0fe11d908af34d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b